Starter Kit for the IBM Iseries and As/400

by ;
Format: Paperback
Pub. Date: 2001-04-01
Publisher(s): 29th Street Pr
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $78.75

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Table of Contents

SETUP
Before the Power Is On
1(18)
A Note About Names
1(1)
An Installation Checklist
1(2)
Before You Install Your System
3(9)
Develop an Installation Plan
3(2)
Plan Education
5(1)
Develop a Migration Plan
5(1)
Develop a Security Plan
6(1)
System Security Level
7(1)
Security Level 10
7(1)
Security Level 20
7(1)
Security Level 30
8(1)
Security Level 40
8(1)
Security Level 50
8(1)
Password Format Rules
9(1)
Identifying System Users
10(2)
Wizardry and Advice
12(1)
Develop a Backup and Recovery Plan
12(3)
Establish Naming Conventions
15(3)
Device Names
15(1)
User Profile Names
16(2)
What Next?
18(1)
That Important First Session
19(14)
Establish User ASPs
19(1)
Verify Software and PTF Levels
20(1)
Signing On for the First Time
20(5)
Set the Security Level
20(1)
Set the Password Format Control System Values
20(1)
Change the System-Supplied User Profile Passwords
21(2)
Enable/Disable Autoconfiguration
23(1)
Set General System Values
23(2)
Establishing Your Work Environment
25(6)
Establish Your Subsystems
26(2)
Retrieve and Modify the Star-up Program
28(3)
Now What?
31(2)
Access Made Easy
33(36)
What Is User Profile?
33(2)
Creating User Profiles
35(10)
UsrPrf (User Profile)
35(1)
Password (User Password)
35(1)
PwdExp (Set Password to Expired)
36(1)
Status (Status)
36(1)
UsrCls (User Class) and SpcAut (Special Authority)
36(3)
Initial Sign-On Options
39(2)
System Value Overrides
41(1)
Group Profiles
42(1)
JobD (Job Description)
43(1)
Message Handling
44(1)
Printed Output Handling
44(1)
Text (Text Description)
45(1)
Plan Your Profiles
45(1)
Maintaining User Profiles
46(4)
Changing a User Password
47(1)
Deleting a User Profile
47(3)
Integrity: The CpyUsr and CrtUsr Commands
50(17)
Making User Profiles Work for You
67(2)
Public Authorities
69(8)
What Are Public Authorities?
70(4)
Creating Public Authority by Default
72(2)
Limiting Public Authority
74(1)
Public Authority by Design
74(1)
Object-Level Public Authority
75(2)
Installing a New Release
77(16)
Planning is Preventive Medicine
77(1)
The Planning Checklist
78(8)
Pre-Installation-Day Tasks
78(1)
Step 1: Is Your Order Complete?
79(2)
Step 2: Manual or Automatic?
81(1)
Step 3: Permanently Apply PTFs
82(1)
Step 4: Clean Up Your System
82(1)
Step 5: Is There Enough Room?
83(1)
Step 6: Document System Changes
84(1)
Step 7: Get the Latest Fixes
84(1)
Step 8: Save Your System
84(1)
Installation-Day Tasks
85(1)
Step 9: Resolve Pending Operations
85(1)
Step 10: Shut Down the INS/IXS
85(1)
Installing from Tape?
86(1)
Step 11: Verify System Integrity
86(1)
Step 12: Check System Values
87(1)
Ready, Set, Go!
87(4)
Final Advice
91(2)
An Introduction to PTFs
93(10)
When Do You Need a PTF?
93(1)
How Do You Order a PTF?
94(2)
SndPTFOrd Basics
94(2)
Ordering PTFs on the Internet
96(1)
How Do You Install and Apply a PTF?
96(1)
PTFs and Logical Partitioning (LPAR)
97(3)
Installing Licensed Internal Code PTFs
98(1)
Installing Licensed Program Product PTFs
99(1)
Verifying Your PTF Installation
99(1)
How Current Are You?
100(1)
Developing a Proactive PTF Management Strategy
100(3)
Preventive Service Planning
100(1)
Preventive Service
101(1)
Corrective Service
102(1)
OPERATIONS
Getting Your Message Across: User-to-User
103(8)
Sending Messages 101
103(2)
Sending Messages into History
105(1)
Message Delivery with SndMsg
105(1)
I Break for Messages
106(1)
Messaging with Operational Assistant
107(1)
Casting Network Messages
108(3)
Secrets of a Message Shortstop
111(12)
Return Reply Requested
111(6)
A Table of Matches
113(4)
Give me a Break Message
117(4)
Take a Break
117(4)
It's Your Own Default
121(2)
Printer Files, Job Logs, and Print Direction
123(20)
How Do You Make It Print Like This?
123(4)
Controlling When a Report Is Printed
126(1)
Controlling Your Job Logs
127(6)
Conrolling Where the Printed Output Is Directed
128(2)
Deciding to Generate a Printed Job Log for Normally Completed Jobs
130(2)
Determining How Much Information to Include in Job Logs
132(1)
Where Have All the Reports Gone?
133(5)
Tailoring Print Direction
134(1)
*Job
134(1)
*JobD
135(1)
*Current
135(1)
*UsrPrf
136(1)
*WrkStn
136(1)
*SysVal
137(1)
*Dev
137(1)
Charting the Print Path
138(2)
Job QPrtJob and Print Direction
140(2)
Ready for Action
142(1)
Understanding Output Queues
143(14)
What Is an Output Queue?
143(2)
How to Create Output Queues
145(4)
Procedural Parameters
147(1)
Configuration Parameters
148(1)
Security Parameters
148(1)
Who Should Create Output Queues?
149(1)
How Spooled Files Get on the Queue
150(1)
How Spooled Files Are Printed from the Queue
151(2)
A Different View of Spooled Files
153(2)
How to Organize Output Queues
155(2)
A Plug-and-Play Output Queue Monitor
157(56)
Setting the Stage
158(2)
The Output Queue Monitor Utility
160(5)
Configuring the Output Queue Monitor
162(1)
Using the Output Queue Monitor
163(1)
Monitoring Program OutQMon
164(1)
Installing the Output Queue Monitor Utility
165(48)
Disk Storage Cleanup
213(16)
Automatic Cleanup Procedures
213(3)
Manual Cleanup Procedures
216(4)
Detach, Save, and Clean Up Security Audit Journal Receivers
217(1)
Reclaim Spool File Storage
217(1)
Reclaim Storage and Clean Up Recovery Areas
218(1)
How RclStg Deals with Lost Objects
218(2)
Recovering After RclStg
220(1)
Commands Used in Recovery Area Cleanup
220(6)
Remove Unused Licensed Program Products
222(1)
Permanently Apply PTFs as Necessary
222(1)
Detach, Save, and Clean Up Journal Receivers
222(1)
Reset User Message Queue Size
222(1)
Clean Up Spooled Files
223(1)
Clear or Delete Unneeded Save Files
223(1)
Delete Unused Objects
223(2)
Reorganize Document Library Objects
225(1)
Purge and Reorganize Physical Files
225(1)
Clean Up Office Vision for AS/400 Objects
225(1)
Clean Up Hardware Configuration
226(1)
Enhancing Your Manual Procedures
226(3)
All Aboard the OS/400 Job Scheduler!
229(18)
Arriving on Time
229(1)
Running on a Strick Schedule
230(5)
Two Trains on the Same Track
235(7)
Derailment Dangers
242(5)
Job Schedule Entries and the LDA
243(1)
SbmJob vs. the Job Scheduler
243(1)
A Matter of Timing
244(1)
System Date and Time Changes
244(1)
Detecting the Completion of Other Jobs
245(2)
Keeping Up with the Past
247(6)
The History Log
247(4)
System Message Show and Tell
247(2)
History Log Housekeeping
249(2)
Inside Information
251(2)
SYSTEM MANAGEMENT
Backup Basics
253(26)
Designing and Implementing a Backup Strategy
253(2)
Availability Options
255(6)
Implementing a Simple Backup Strategy
258(1)
Implementing a Simple Backup Strategy
259(1)
Saving Changed Objects
259(1)
Journaling Objects and Saving the Journal Receivers
260(1)
Saving Groups of User Libraries, Folders, or Directories
261(1)
Implementing a Complex Backup Strategy
261(1)
Saving Data Concurrently Using Multiple Tape Devices
261(1)
Saving Data in Parallel Using Multiple Tape Devices
262(1)
Save-While-Active
262(1)
An Alternative Backup Strategy
262(1)
The Inner Workings of Menu SAVE
262(5)
Entire System (Option 21)
263(1)
System Data Only (Option 22)
264(1)
All User Data (Option 23)
264(1)
Setting Save Option Defaults
265(1)
Printing System Information
266(1)
Saving Data Concurrently Using Multiple Tape Devices
267(2)
Concurrent Saves of Libraries and Objects
267(1)
Concurrent Saves of DLOs (Folders)
268(1)
Concurrent Saves of Objects in Directories
269(1)
Save-While-Active
269(2)
How Does Save-While-Active Work?
269(1)
Synchronization
269(2)
Save Commands That Support the Save-While-Active Option
271(1)
Backing Up Spooled Files
271(1)
Recovering Your System
272(1)
Preparing and Managing Your Backup Media
273(6)
Backup, Recovery and Media Services (BRMS) Overview
279(16)
An Introduction to BRMS
279(1)
Getting Started with BRMS
280(2)
Saving Data in Parallel with BRMS
282(1)
Online Backup of Lotus Notes Servers with BRMS
282(1)
Restricted-State Saves Using BRMS
283(1)
Backing Up Spooled Files with BRMS
283(2)
Including Spooled File Entries in a Backup List
284(1)
Restoring Spooled Files Saved Using BRMS
285(1)
The BRMS Operations Navigator Interface
285(2)
Terminology Differences
286(1)
Functional Differences
286(1)
Backup and Recovery with BRMS OpsNav
287(2)
Backup Policies
287(1)
Creating a BRMS Backup Policy
287(1)
Backing Up Individual Items
288(1)
Restoring Individual Items
288(1)
Scheduling Unattended Backup and Restore Operations
288(1)
System Recovery Report
289(1)
BRMS Security Functions
289(3)
Security Options for BRMS Functions, Components, and Items
290(2)
Media Management
292(1)
BRMS Housekeeping
292(1)
Check It Out
293(2)
Defining a Subsystem
295(10)
Getting Oriented
295(2)
Defining a Subsystem
297(1)
Main Storage and Subsystem Pool Definitions
298(3)
Starting a Subsystem
301(2)
The Next Step
303(2)
Where Jobs Come From
305(10)
Types of Work Entries
305(8)
Workstation Entries
306(1)
Using Workstation Entries
307(1)
Conflicting Workstation Entries
308(1)
Job Queue Entries
309(2)
Communications Entries
311(1)
Prestart Job Entries
312(1)
Autostart Job Entries
313(1)
Where Jobs Go
313(2)
Demystifying Routing
315(14)
The Importance of Routing Data
315(4)
Routing Entry Attributes
317(1)
Runtime Attributes
318(1)
Routing Data for Interactive Jobs
319(1)
Routing Data for Batch Jobs
320(2)
Routing Data for Autostart, Communications, and Prestart Jobs
322(1)
Is There More Than One Way to Get There?
322(1)
Do-It-Yourself Routing
322(7)
FILE BASICS
File Structures
329(8)
Structure Fundamentals
329(2)
Data Members
331(3)
iSeries File Types
334(3)
Database Files
334(1)
Source Files
334(1)
Device Files
335(1)
DDM Files
336(1)
Save Files
336(1)
So You Think You Understand File Overrides
337(24)
What Do Overrides Do?
337(2)
Prerequisites
339(2)
The Call Stack and Job Call Levels
339(1)
Activation Groups
340(1)
Override Rules
341(15)
Scoping and Override
341(1)
Overriding the Same File Multiple Times
342(2)
The Order of Applying Overrides
344(9)
Protecting an Override
353(1)
Explicitly Removing an Override
354(1)
Miscellanea
355(1)
Important Additional Override Information
356(1)
Overriding the Scope of Open Files
356(1)
Non-File Overrides
356(1)
Overrides and Multithreaded Jobs
357(1)
File Redirection
357(1)
Is All This Really Necessary?
357(1)
Overrides and System Commands
358(3)
Logical Files
361(10)
Record Format Definition/Physical File Selection
361(3)
Key Fields
364(1)
Select/Omit Logic
365(4)
Using Select/Omit Statements
366(2)
Dynamic Selection with Select/Omit
368(1)
Multiple Logical File Members
369(1)
Keys to the iSeries Database
370(1)
File Sharing
371(16)
Sharing Fundamentals
371(2)
Sharing Examples
373(8)
Shared Database File Example
373(3)
Shared Printer File Example
376(5)
How Sharing ODPs Can Help
381(1)
Share and Enhance Program Performance
381(6)
BASIC CL PROGRAMMING
CL Programming: You're Stylin' Now!
387(16)
Apples and Oranges
387(3)
Developing Stylistic Standards
390(11)
Comments
397(1)
Statement Alignment
398(1)
Variable Names and Case
399(1)
Shortcut Dos and Don'ts
400(1)
Miscellaneous Suggestions
400(1)
Start Stylin'!
401(1)
CL Coding Suggestions
401(2)
Extend CL's Reach with APIs
403(24)
Know Your Limitations
403(2)
Reporting Errors with APIs
405(7)
Handling API Errors
407(5)
Retrieve an IP Address
412(14)
Displaying IP Addresses
416(10)
EndPgm
426(1)
CL Programs and Database Files
427(14)
Why CL?
427(1)
I DCLare!
427(1)
Extracting Field Definitions
428(2)
Reading the Database File
430(2)
File Positioning
432(1)
Rules for Database File Processing in CL
433(1)
What About Record Output?
434(1)
A Useful Example
435(6)
CL Programs and Display Files
441(12)
CL Display File Basics
441(4)
CL Display File Examples
445(7)
Using a Message Subfile
449(1)
Using an Error Subfile
450(2)
Considerations
452(1)
OpnQryF Fundamentals
453(12)
First Things First
453(1)
The Command
454(1)
Start with a File and a Format
454(3)
Record Selection
457(5)
QrySlt Guidelines
458(1)
QrySlt and Constants
458(1)
QrySlt and Variables
459(3)
Differentiate Between Upper- and Lowercase Data
462(1)
Key Fields
462(1)
Mapping Virtual Fields
463(1)
OpnQryF Command Performance
464(1)
Teaching Programs to Talk
465(20)
Putting SndUsrMsg to Work
465(6)
Send Break Messages to a User with SndBrkMsgU
471(13)
Knowing When to Speak
484(1)
Just Between Us Programs
485(12)
Call Message Queues
485(2)
Understanding Job Logs
487(1)
The SndPgmMsg Command
488(5)
Message Types
491(2)
The Receiving End
493(1)
Program Message Uses
493(4)
Hello, Any Messages?
497(14)
Receiving the Right Message
497(3)
RcvMsg and the MsgType and MsgKey Parameters
500(1)
Receiving the Right Values
501(3)
Retrieving Message Sender Data
501(1)
Retrieving the Message Return Type
502(2)
Monitoring for a Message
504(6)
Command-Level Message Monitoring
506(1)
Global Message Monitoring
506(2)
Message Processing in Action
508(2)
What Else Can You Do with Messages?
510(1)
OS/400 Commands
511(8)
Commands: The Heart of the System
511(3)
Tips for Entering Commands
514(2)
Customizing Commands
516(1)
Changing Default Values
517(2)
THE NEW FACE OF THE SYSTEM
It's Gotta Be TCP/IP, If You Wanna Talk with Me
519(22)
Networks and Internetworks
520(4)
IP Addressing
524(5)
Classful IP Addressing
524(2)
Classless Addressing and Subnetworks
526(3)
Peaceful Coexistence
529(1)
A Simple iSeries Configuration
530(6)
Starting TCP/IP
535(1)
TCP/IP Administration and Configuration Options
536(2)
Identifying Other Hosts in Your Network
538(2)
The Real World
540(1)
Operations Navigator
541(16)
OpsNav Components
541(12)
Basic Operations
543(6)
Job Management
549(1)
Configuration and Service
549(1)
Network
550(1)
Security
550(1)
Users and Groups
551(1)
Database
551(1)
File Systems
551(1)
Multimedia
552(1)
Backup
552(1)
Application Development
552(1)
Management Central
552(1)
Application Administration
553(1)
Plug-in Support
553(1)
More Than Just a Pretty Face
553(1)
More About OpsNav
554(3)
Further Reading 557(4)
Index 561

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.